You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Functional Allocation Trades Between Hardware and Software

    SBC: WW TECHNOLOGY GROUP, INC            Topic: OSD12ER2

    Design, analysis, and assessment of multiple alternatives is important to ensuring the development and fielding of DoD systems that face increasingly dynamic and rapid changes in missions. New methods and tools are needed that compensate and recover from disruptions, adapt to dynamic environments, and rapidly deliver new solutions. A key goal is ensuring that engineering programs maximize utility ...

    SBIR Phase I 2013 Department of DefenseArmy
  2. CREACT: Advanced Network Security Metrics for Cyber REsilience and Asset CriTicality Measurement in Mission Success

    SBC: Intelligent Automation, Inc.            Topic: OSD12IA3

    Cyber assets usually support missions with different priorities. How to effectively evaluate the health of a network and its ability to achieve the overall mission is critical to ensure mission success. In this effort, Intelligent Automation, Inc. proposes"CREACT", a set of advanced network security metrics for cyber resilience and asset criticality measurement in a large-scale and dynamic network ...

    SBIR Phase I 2013 Department of DefenseArmy
  3. Recognition of New Advanced Threats Using Purpose and Network Correlators (RAPCOR)

    SBC: Intelligent Automation, Inc.            Topic: OSD12IA4

    Cyber intrusion and anomaly detection techniques suffer from their reliance upon the presence of known malicious signatures or unusual conditions that warrant further investigation. The use of signature-based detection cannot effectively eliminate false negatives when dealing with advanced persistent threats (APTs). Furthermore, current detection tools incur very high false positives. To address ...

    SBIR Phase I 2013 Department of DefenseArmy
  4. An Integrated Threat feed Aggregation, Analysis, and Visualization (TAAV) Tool for Cyber Situational Awareness

    SBC: Intelligent Automation, Inc.            Topic: OSD12IA5

    Cyber security analysts are inundated with heterogeneous threat feeds created by different kinds of cyber security monitoring tools such as Snort, Nessus, Symantec etc. There is a need for streamlining threat analysis to help operators focus on prompt identification and comprehension of security threats early on. To address this critical need, Intelligent Automation Inc. (IAI), with Prof. Peng Liu ...

    SBIR Phase I 2013 Department of DefenseArmy
  5. RADAR: A Comprehensive and Dynamic Framework toward Real time Network Traffic Resiliency

    SBC: Intelligent Automation, Inc.            Topic: OSD12IA6

    This effort proposes a comprehensive framework to design and develop an intelligent, dynamic and real time traffic monitoring/filtering system to identify and covertly divert suspicious/malicious traffic (within an enterprise network) to specific locations for further analysis and to ensure resilient network traffic boundary. The proposed approach exploits existing algorithms/technologies (e.g., c ...

    SBIR Phase I 2013 Department of DefenseArmy
  6. Functional Allocation Trades Between Hardware and Software

    SBC: VISTOLOGY, INC.            Topic: OSD12ER2

    It is expected that the US military forces will be facing many new, unexpected types of mission from combat operations to humanitarian assistance and disaster recovery (HA/DR). To be able to accomplish such missions, the military will require"resilient systems"of all kinds digital, electrical and mechanical. The development of such new systems requires new design tools that can support the desig ...

    SBIR Phase I 2013 Department of DefenseArmy
  7. High Energy Laser Testing of Thermal Protection Materials with a New Diagnostic

    SBC: PHYSICAL SCIENCES INC.            Topic: N/A

    The Department of Defense and their contractors are currently limited in their ability to fabricate high temperature thermal protection and structural materials and include those materials in new aerospace vehicle designs without risk of thermally induced material failures which might compromise the new designs. Major improvements in structural designs will be difficult without cost effective mat ...

    SBIR Phase I 1997 Department of DefenseArmy
  8. A system for Using Knowledge of Narratives for Optimizing Workspaces to Enhance Reasoning (KNOWER)

    SBC: CHARLES RIVER ANALYTICS, INC.            Topic: OSD12LD4

    The wealth of data provided by modern information fusion (IF) tools to intelligence analysts exceeds their ability to effectively process, exploit, and disseminate actionable intelligence. This issue arises because these IF tools define information value and usage statically, and consider analysts rational and deterministic system components, rather than dynamic, critically thinking individuals wh ...

    SBIR Phase I 2013 Department of DefenseArmy
  9. Framework for Computing Assurance Measurements based on Evolving Resilience Metrics (FRAMER)

    SBC: CHARLES RIVER ANALYTICS, INC.            Topic: OSD12IA3

    As command and control, doctrine, and tactics evolve with the cyber network at its core, mission-critical tasks increasingly rely on the integrity and responsiveness of the network and other cyber assets. While this trend has acted as a tremendous force multiplier and OPTEMPO accelerator, two major concerns arise: (1) network usage demands will soon outstrip the capabilities of a resource-constrai ...

    SBIR Phase I 2013 Department of DefenseArmy
  10. Feed Aggregation for Threat Evaluation Service (FATES)

    SBC: CHARLES RIVER ANALYTICS, INC.            Topic: OSD12IA5

    CNDSP analysts protect US computer networks, detect threat occurrences on those networks, and respond to threat incidents. The adage"know thy enemy"is as true for network defense as it is for defense of any asset. A robust computer network defense requires current knowledge of possible and actual threats and knowledge of conditions within the network. However, analysts must invest valuable time ma ...

    SBIR Phase I 2013 Department of DefenseArmy
US Flag An Official Website of the United States Government